Author:
Lee Yi Yong,Gan Chin Lay,Liew Tze Wei
Publisher
Springer Science and Business Media LLC
Subject
Law,Safety Research,Sociology and Political Science
Reference114 articles.
1. Airehrour, D., N.V. Nair, and S. Madanian. 2018. Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model. Information 9 (110): 1–18.
2. Algarni, A. 2019. What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk. Information 10 (211): 1–31.
3. Alqahtani, M.A. 2022. Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience. https://doi.org/10.1155/2022/6775980.
4. Alseadoon, I., M.F.I. Othman, and T. Chan. 2014. What Is the Influence of Users’ Characteristics on Their Ability to Detect Phishing Emails? In Advanced Computer and Communication Engineering Technology 949–962.
5. Anwar, M., W. He, I. Ash, X. Yuan, L. Li, and L. Xu. 2017. Gender Difference and Employees’ Cybersecurity Behaviors. Computers in Human Behavior 69: 437–443.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献